DiscoverCybersecurity Today
Cybersecurity Today
Claim Ownership

Cybersecurity Today

Author: ITWC

Subscribed: 1,959Played: 80,363
Share

Description

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
886 Episodes
Reverse
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and more
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departments
This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international, and more
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetings
This episode reports on a new anti-ransomware strategy, and more
This episode features a discussion on Microsoft's cybersecurity troubles, worries about open source, a warning about abusing IT help desks to launch attacks and more
This episode reports on a new way threat actors are planting malware on GitHub, why you should watch for the running of unexpected automated scripts on your network, and more
This episode reports on a warning to application developers using the Rust language, the need to unplug end of life D-Link NAS devices, and more
This episode reports on AI and Magento scams, and more
This episode features a discussion on a highly critical report on the hacking of Microsoft Exchange Online email accounts, a case study of a ransomware attack and the discovery of a years-long infiltration of an open source group to insert a backdoor into Linux
This episode reports on vulnerabilities in HTTP/2, RDP weaknesses a major cause of successful cyber attacks, and more
This episode reports on a data breach at OWASP, Google to delete data it collected in Incognito Mode, and more
This episode reports on a way threat actors can get around cloud-based email filtering systems, the latest information on an AT&T data theft, and more
This episode features a discussion on World Backup Day, a security awareness report and more
This episode reports on a US$10 million reward for a ransomware gang, a new Linux version of a backdoor, and more
This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet, and more
This episode reports on a new campaign stealing email passwords, the latest data breaches, and more
This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotected and more
This episode reports on the discovery of a side-channel vulnerability in Apple M-series chips and more
This episode reports on new backdoors, a new paper giving advice to OT network operators and more
loading
Comments (1)

Denny Luyis

When you use a third party platform that offers an app for your on-premise platform - https://www.protectimus.com/platform/ , you are automatically taking advantage of the multi-factor security that they offer. It is easy to forget when you are using your computer, tablet, or smartphone that all of your data is being tracked in some way. With the use of a Protectimus application, your data is encrypted and protected even more. You are also provided with a second layer of security as a secondary level of protection. This helps to make your business' data secure even more.

Jul 26th
Reply
Download from Google Play
Download from App Store